Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-52155 | In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS |
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2022/sa2023-01/ |
|
Thu, 27 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-03-27T14:39:44.384Z
Reserved: 2023-01-30T00:00:00.000Z
Link: CVE-2022-4898
Updated: 2024-08-03T01:55:45.702Z
Status : Modified
Published: 2023-01-31T04:15:07.647
Modified: 2025-03-27T15:15:41.703
Link: CVE-2022-4898
No data.
OpenCVE Enrichment
No data.
EUVD